Search Results

61 - 70 of 120 items :

  • Information Technology x
Clear All
Definition of the Criteria for Layout of the UML Use Case Diagrams

I. G. Tollis, Graph Drawing: Algorithms for the Visualization of Graphs . Pearson, 1999. [18] H. Eichelberger, “Aesthetics of class diagrams”, Proceedings of the 1st International Workshop on Visualizing Software for Understanding and Analysis, VISSOFT, 2002, pp. 23–31. [19] M. Eiglsperger, M. Kaufmann, and M. Siebenhaller, “A topology-shape-metrics approach for the automatic layout of UML class diagrams”, Soft Vis’03: Proceedings of the 2003 ACM Symposium on Software Visualization , 2003, pp. 189–198.

Open access
Skeleton-based 3D Surface Parameterization Applied on Texture Mapping

/ ACM SIGGRAPH symposium on Geometry processing. SGP ’03. Eurographics Association, Aire-la- Ville, Switzerland, Switzerland, 127-137. HAKER, S., ANGENENT, S., TANNENBAUM, A., KIKINIS, R., SAPIRO, G., AND HALLE, M. 2000. Conformal surface parameterization for texture mapping. IEEE Transactions on Visualization and Computer Graphics 6, 181-189. HE, Y., WANG, H., FU, C.-W., AND QIN, H. 2009. A divide-and-conquer approach for automatic polycube map construction. Computers & Graphics, 369-380. HILAGA, M., SHINAGAWA, Y

Open access
Circumventing Cryptographic Deniability with Remote Attestation

,” Tech. Rep., 2016. [5] (2018) Briar: Secure messaging, anywhere. Accessed 2018-04-29. [Online]. Available: [6] (2018) Messenger. Accessed 2018-05-03. [Online]. Available: [7] (2018) OTR version 4. Draft, accessed 2018-05-03. [Online]. Available: [8] “Signal Protocol C library,” Code, 2018, commit 9e10362fce9072b104e6d5a51d6f56d939d1f36e. [Online]. Available: [9] N. Asokan, G. Tsudik

Open access
On the Privacy and Security of the Ultrasound Ecosystem

:// , 2016. [10] Signal360’s Use Cases. , 2016. [11] 3GPP. 3rd generation partnership project, technical specification of international mobile station equipment identities (imei). [12] A. Andreadis and G. Giambene. The global system for mobile communications. Protocols for High-Efficiency Wireless Networks , pages 17–44, 2002. [13] anfractuosity. Ultrasound Networking. 00003. [14] Audible magic. , 2016. [15] C. Calabrese. Comments for November 2015 Workshop on

Open access
Code Generation from UML Model: State of the Art and Practical Implications

, China, June 8-11, 2011, SciTePress, Portugal, Printed in China, pp. 57-67 [3] A. Bajovs, Research of the Basic Principles of the Model-To-Code Transformation, Bachelor Thesis, Riga Technical University, 2012 [4] OMG: MDA Guide Version 1.0.1, [Online]. Available: [Accessed: Sept. 23, 2012] [5] M. Volter, “From Programming to Modeling - and Back Again”, IEEE Software, Nov.-Dec. 2011, pp. 20-25. [6] T. Stahl and M. Volter

Open access
Privacy Challenges in the Quantified Self Movement – An EU Perspective

on purchasing behavior: An experimental study. Info. Sys. Research, 22(2):254-268, June 2011. [37] G. Wolf. What is The Quantified Self., Mar. 2011. [38] C. K. Wong, M. Gouda, and S. S. Lam. Secure group communications using key graphs. In Proceedings of the ACM SIGCOMM ’98 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication, SIGCOMM ’98, pages 68-79, New York, NY, USA, 1998. ACM. [39] A. C. Yao. Protocols for

Open access
Extensible Model for Comparison of Expressiveness of Object-Oriented Programming Languages

Architectural Design in Europe (eCAADe) , Newcastle upon Tyne, England, Sep. 22–26, 2014, pp. 257–266. [6] W. M. Farmer, “Chiron: a multi-paradigm logic,” Studies in Logic, Grammar and Rhetoric , vol. 10, no. 23, 2007, pp. 1–19. [7] S. C. McConnell, Code Complete, Microsoft Press, 2004. [8] D. Berkholz, “Programming languages ranked by expressiveness,” March 2013. [Online]. Available: [Accessed: Nov. 28, 2016]. [9] Y. Zhang, M. C. Loring, G. Salvaneschi, B

Open access
Towards Mining Latent Client Identifiers from Network Traffic

:// Online. Sep, 2015. [7] Safe Browsing API. [8] Xprobe. Online. Sep, 2015. [9] G. Acar, C. Eubank, S. Englehardt, M. Juarez, A. Narayanan, and C. Diaz. The web never forgets: Persistent tracking mechanisms in the wild. In Proceedings of the ACM SIGSAC Conference on Computer and Communications Security, 2014. [10] G. Acar, M. Juarez, N. Nikiforakis, C. Diaz, S. Gürses, F. Piessens, and B

Open access
Fingerprinting Mobile Devices Using Personalized Configurations

References [1] Apple, “Worldwide Developer’s Conference (WWDC) Keynote 2014.” [2] AppBrain Stats, “Distribution of free vs. paid Android apps.” [3] M. Egele, C. Kruegel, E. Kirda, and G. Vigna, “Pios: Detecting privacy leaks in ios applications.,” in NDSS, 2011. [4] A. Kurtz, A. Weinlein, C. Settgast, and F. Freiling, “DiOS: Dynamic Privacy Analysis of

Open access
Investigating sources of PII used in Facebook’s targeted advertising

email without consent. . [23] Facebook: About the delivery system: Ad auctions. . [24] How Facebook Figures Out Everyone You’ve Ever Met. . [25] How Trump Conquered Facebookâ•flWithout Russian Ads. . [26] Improving Enforcement and Promoting Diversity: Updates to Ads

Open access